Sciweavers

727 search results - page 103 / 146
» ads 2004
Sort
View
AOSD
2004
ACM
14 years 1 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
ASPDAC
2004
ACM
102views Hardware» more  ASPDAC 2004»
14 years 1 months ago
TranGen: a SAT-based ATPG for path-oriented transition faults
— This paper presents a SAT-based ATPG tool targeting on a path-oriented transition fault model. Under this fault model, a transition fault is detected through the longest sensit...
Kai Yang, Kwang-Ting Cheng, Li-C. Wang
ASSETS
2004
ACM
14 years 1 months ago
Accessibility of Internet websites through time
Using Internet Archive’s Wayback Machine, a random sample of websites from 1997-2002 were retrospectively analyzed for effects that technology has on accessibility for persons w...
Stephanie Hackett, Bambang Parmanto, Xiaoming Zeng
CHI
2004
ACM
14 years 1 months ago
Text analysis as a tool for analyzing conversation in online support groups
In this paper we describe a software tool that allows investigators to make comparisons across different online forums and media by analyzing word counts in userspecified categori...
Adam D. I. Kramer, Susan R. Fussell, Leslie D. Set...
DMKD
2004
ACM
167views Data Mining» more  DMKD 2004»
14 years 1 months ago
FP-tax: tree structure based generalized association rule mining
Data mining has been widely recognized as a powerful tool to explore added value from large-scale databases. One of data mining techniques, generalized association rule mining wit...
Iko Pramudiono, Masaru Kitsuregawa